ISSC361 Five Basic Attacks on Authentication Systems (2024)

Respond to the below two students discussion with 150 words minimum. The question they are responding to re below in bold just so you will know.

For this assignment, create a new message and address the following items in your response.

  1. Describe the five basic attacks on authentication systems.
  2. Outline the symmetric encryption process and explain the components involved in the process.
  3. Summarize the different situations in which people use file encryption software.
  4. Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

Student one:

Describe the five basic attacks on authentication systems.

  1. Clone or borrow the credential – “Shoulder Surfing” Watching people type passwords
  2. Sniff the credential – Digital shoulder surfing, we collect packets via wireshark or similar packet sniffing software and look for passwords and tokens.
  3. Trial and error guessing – use statistics to help your guesses
  4. Denial of Service -overloading the system to lock the user out, preventing access into the system.
  5. Retrieve offline – You can bypass a lot of security if you can get an offline backup.

Outline the symmetric encryption process and explain the components involved in the process.

Symmetric encryption is where the same key is used for both encryption and decryption of the data. To start, the user decides to encrypt his data. He must decide on a key to decrypt the data. He then uses software that automatically encrypts the data using that key. Now the user feels comfortable sending the data out to user 2 who now has a problem. User 2 must somehow be aware of the key that User 1 created. Often, this key is sent through a different means than the encrypted data. If the encrypted data is sent via Email, then the key is shared via phone or text. Now having the key, User 2 can now decrypt the data.

Summarize the different situations in which people use file encryption software.

If at any point for any reason the data manager feels that the data risks being compromised, then encrypting the data is warranted. Any sensitive data being sent over the internet MUST be encrypted. Server, system, and profile backups need to be encrypted and secured off network to prevent attackers from gaining access and manipulating data.

Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

Asymmetric encryption is where there is one key for encryption, and a separate key for decryption. The decryption key is a closely guarded secret and never shared with anyone ever. This key is called the private key. The key used for encrypting data is not kept secret and shared widely. This key is called the public key. The public now knows your encryption standard, and can encrypt any data they want using your standard. These keys are not reversible, so until you decrypt the data with your private key, the data is unreadable.

Die-Hoffman (DH): is a hybrid of asymmetric and symmetric encryption. The encryption is symmetric but they manage to share the key with each other without actually sending the key.

RSA: is the standard Asymmentric encryption system.

Reference:

Smith, R. E. (2016). Elementary information security, 2nd Edition. Subury, MA: Jones & Bartlett Learning.

-Arn

Student two:

  1. Describe the five basic attacks on authentication systems

The 5 basic authentication attacks are, Clone or borrow the credentials or token, Sniff the credential, Trial and error, Denial of service (DoS), and Retrieve from a backup.

Clone or borrow is an attack that is usually done by shoulder surfing or finding the login credentials and using those to log in.

Sniff the credentials is a method that captures the login credentials as it is being transmitted to the login process.

Trial and error is exactly what it is, trial and error. This attack is just trying different combination until the attacker gets one right to be able to log in.

The denial of service attack is were the attacker can damage the system which will block assess to the system by others.

Retrieve from a backup is being able to get the log in information from a backup on the hard drive and using the log in information to be able to access account.

  1. Outline the symmetric encryption process and explain the components involved in the process.

Symmetric encryption is a way to encrypt and decrypt using the same key. There are two categories for the symmetric encryption and that is the code and cypher. The code encryption uses words or phrases to hide a message within. For instance, the military uses code words for many things for instance “Oscar Mike” means “On The Move”.

Cypher encryption uses algorithms to encrypt data and only someone who has the PKI key and decrypt the message, for instance encrypting an email and only the receiver can open and decrypt the message.

  1. Summarize the different situations in which people use file encryption software.

You would want to encrypt your data if you care carrying an external HD, sending an email, or using a public workstation to name a few.

  1. Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

There are two part to asymmetric encryption “public key and private key” both of these are needed to be able to encrypt a file or email. One-way asymmetric encryption is used is with email, you will use a private key and public key to encrypt the message and only those keys can decrypt the message.

Matt

ISSC361 Five Basic Attacks on Authentication Systems (2024)
Top Articles
How to Find a Bug in Your Code | 8th Light
What Are TIPS Bonds? | U.S. Bank
Play FETCH GAMES for Free!
My Arkansas Copa
Truist Bank Near Here
Byrn Funeral Home Mayfield Kentucky Obituaries
Scentsy Dashboard Log In
No Credit Check Apartments In West Palm Beach Fl
How Quickly Do I Lose My Bike Fitness?
Sitcoms Online Message Board
Newgate Honda
Nier Automata Chapter Select Unlock
Costco Gas Foster City
Samsung Galaxy S24 Ultra Negru dual-sim, 256 GB, 12 GB RAM - Telefon mobil la pret avantajos - Abonament - In rate | Digi Romania S.A.
Cbs Trade Value Chart Fantasy Football
Q33 Bus Schedule Pdf
Palm Coast Permits Online
Average Salary in Philippines in 2024 - Timeular
Gayla Glenn Harris County Texas Update
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Amortization Calculator
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Pecos Valley Sunland Park Menu
Walmart Near South Lake Tahoe Ca
Craigslist Lewes Delaware
All Obituaries | Gateway-Forest Lawn Funeral Home | Lake City FL funeral home and cremation Lake City FL funeral home and cremation
At&T Outage Today 2022 Map
Hampton University Ministers Conference Registration
Gotcha Rva 2022
Ou Class Nav
Costco Gas Hours St Cloud Mn
Hannaford Weekly Flyer Manchester Nh
Panolian Batesville Ms Obituaries 2022
Wonder Film Wiki
Medline Industries, LP hiring Warehouse Operator - Salt Lake City in Salt Lake City, UT | LinkedIn
Hrconnect Kp Login
Prévisions météo Paris à 15 jours - 1er site météo pour l'île-de-France
Used 2 Seater Go Karts
Hoofdletters voor God in de NBV21 - Bijbelblog
Cbs Trade Value Chart Week 10
Morlan Chevrolet Sikeston
Blackwolf Run Pro Shop
WorldAccount | Data Protection
Coroner Photos Timothy Treadwell
Cocorahs South Dakota
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Ferhnvi
Walmart Careers Stocker
Aurora Southeast Recreation Center And Fieldhouse Reviews
Códigos SWIFT/BIC para bancos de USA
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6598

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.